Posts for category: Best Practices Weekly Summaries

Password Manager

Background – Today, there are still people who use the same passwords across their online accounts. Often times, passwords are only changed when they are forgotten. Identity theft is a result ...

Data Breaches – What You Can Do

Background – A security incident where information is accessed without authorization is also known as a data breach. Data breaches are a costly expense that can hurt consumers and businesses in ...

SIM Card Identity Theft

Background- What is a SIM card identity theft? Basically, it is the stealing of your mobile identity. This fairly new way of identity theft/fraud is appearing everywhere. The list of attacks to ...

Incident Response Plan

Background- Cyber-attacks are becoming a more serious issue by the year. Today, there is no arguing with the facts: attacks are more frequent, sophisticated, widespread, and costly than ever. In ...

Biometrics Authentication (3FA)

Background- Sometimes two-factor authentication is not enough. By using “something you know” – username and password, along with “something you have” – hardware token, SMS, software ...

Protect Your Online Accounts with Two-Factor Authentication

Background- Majority of people today have many different online accounts like: Facebook, Instagram, Twitter, banking accounts, email, etc. Each of these accounts have information about your ...

Securing a Home Network

Background: Most day-to-day tasks are normally done from the safety of home. Tasks include: checking your banking statements, paying bills, reading emails, chatting on social media, or simply ...

Do You Need a Cyber Insurance Policy?

Background The first Cyber Insurance (CI) policies were developed for businesses in the late 1990s because of the multitude of emerging technologies that were present at that time, most notably the ...

How to Install Kali Linux as an App in Windows 10

Introduction Recently Kali Linux was released as an application in the Microsoft Store.  Through utilization of the Windows Subsystem for Linux (WSL) compatibility layer, its now possible to ...

Examining the Threat of DDoS

Background Roughly fifteen years ago as broadband internet was beginning to expand throughout North America, I like many other teenagers was reaping the benefits as an avid online gamer.  When ...